New Exploited Vulnerabilities in Palo Alto Networks

New Exploited Vulnerabilities in Palo Alto Networks

Two New Vulnerabilities Added to KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two additional vulnerabilities in the Palo Alto Networks Expedition software that are currently being exploited in the wild. Details of the Security Flaws CISA…


0 Comments3 Minutes

Hackers Behind Bitfinex Breach Face Justice

Hackers Behind Bitfinex Breach Face Justice

Ilya Lichtenstein Sentenced to 5 Years for 2016 Crypto Hack The U.S. Department of Justice (DoJ) announced that Ilya Lichtenstein has been sentenced to five years in prison for his role in the 2016 hacking of the cryptocurrency exchange Bitfinex. Lichtenstein admitted to the crime, where about…


0 Comments3 Minutes

Free Bitdefender Solution for ShrinkLocker Ransomware

Free Bitdefender Solution for ShrinkLocker Ransomware

Free Tool from Bitdefender Helps ShrinkLocker Ransomware Victims Recover Encrypted Files Bitdefender's Free Decryptor Tool Romanian cybersecurity company Bitdefender has introduced a free tool to assist victims of the ShrinkLocker ransomware in recovering encrypted data. After closely examining the…


0 Comments5 Minutes

GoIssue Targets GitHub Users with Mass Phishing Attacks

GoIssue Targets GitHub Users with Mass Phishing Attacks

Overview of the GoIssue Threat Recently, cybersecurity experts identified a new tool called GoIssue, an application that enables cybercriminals to send phishing messages on a massive scale, specifically targeting GitHub users. GoIssue initially appeared on the dark web forum Runion, promoted by a…


0 Comments4 Minutes

Critical Vulnerability Patched in Palo Alto Networks Expedition

New Security Risks in Palo Alto Networks Expedition and CyberPanel Software

Critical Vulnerability Patched in Palo Alto Networks Expedition A major security flaw has been identified and patched in Palo Alto Networks’ Expedition tool, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). This vulnerability, now listed on CISA’s known exploited…


0 Comments3 Minutes

AndroxGh0st Expands Reach by Exploiting Security Flaws

AndroxGh0st Expands Reach by Exploiting Security Flaws

A Growing Cyber Threat The creators of AndroxGh0st malware have started using a wider range of security weaknesses in internet-exposed apps to spread the Mozi botnet. According to a report from CloudSEK, this botnet relies on remote code execution and credential-stealing techniques to keep a…


0 Comments4 Minutes

South Korea Hits Meta with Major Privacy Fine

South Korea Hits Meta with Major Privacy Fine

In a major step to uphold privacy rights, South Korea’s data privacy agency, the Personal Information Protection Commission (PIPC), has fined Meta Platforms Inc., the parent company of Facebook, 21.62 billion won, equivalent to approximately $15.67 million. The hefty fine comes after investigations…


0 Comments5 Minutes

Ollama AI Framework Security Breach

Ollama AI Framework Security Breach

In a detailed report released last week, Avi Lumelsky, a researcher from Oligo Security, shed light on six critical vulnerabilities within the Ollama AI framework. These security flaws could be used by attackers to launch various types of malicious activities, such as denial-of-service (DoS)…


0 Comments6 Minutes

Apple Opens Private Cloud Compute for Security Research

In June, Apple unveiled its Private Cloud Compute (PCC), promoting it as the "most advanced security system ever built for cloud AI computing on a large scale." This innovation allows the processing of demanding AI tasks in the cloud while maintaining user privacy. Now, Apple has made the PCC…


0 Comments3 Minutes

Gophish Toolkit Delivers Remote Access Trojans

Gophish Toolkit Delivers Remote Access Trojans

A new phishing campaign has emerged, primarily targeting Russian-speaking consumers. The attackers are leveraging Gophish, an open-source toolkit, to distribute DarkCrystal RAT (DCRat) and a new remote access trojan called PowerRAT. You might be interested in: 7 Data Breach Disasters – Lessons for…


0 Comments4 Minutes